From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 01 ef 03
01ef037686a87de3db5c0365cc90566aef0ea4ca 01ef03811debec1a581d5cb7649a9c69771883af 01ef03dd084a31f9749fe13223112a8bfe31c83d